Welcome to the first in a series of videos on post quantum cryptography, where we start with a view on the real risk that quantum computing poses today, and an overview of what we as cyber security professionals can do to overcome those risks. We touch on the pros and cons of quantum random number generation, quantum key exchange, and quantumresistant algorithms selected for standardisation by NIST.
References:
NIST’s PostQuantum Crypto Homepage: https://csrc.nist.gov/projects/postq...
NCSC’s QuantumSafe Cryptography Whitepaper: https://www.ncsc.gov.uk/whitepaper/pr...
Timecodes:
0:00 Intro
0:49 Quantum Physics
1:16 Quantum Computing
2:12 Cracking Crypto with Quantum Computers
4:39 Quantum Cryptography
5:17 Quantum Random Number Generation
7:14 Quantum Key Exchange
8:37 QuantumResistant Cryptography
11:39 Roundup
Credits:
Intro/Outro Music: Render Prism: • Render Prism [Creative Commons] (via Argofox: / argofox )
Diagram icons designed by OpenMoji (https://openmoji.org/) CC BYSA 4.0